59 research outputs found

    VALUE STREAM MAPPING FOR EMPLOYEE RE-IMBURSEMENT PROCESS OF AN ENTERPRISE

    Get PDF
    Every organization is striving hard on getting more work done in less time and with greater ease.  The organizations have been working continuously to improve their cycle time by minimizing the wastes within the system and maximizing their flow. It not only provides them with the improved quality at a reasonable price but also leads to the customer satisfaction by providing the right product/service at the right time. Value Stream Mapping (VSM) is a paper and pencil tool that helps one to see and understand the flow of material and information as a product or service makes its way through the value stream. The main objective of Value Stream Mapping is to understand the ways to lean the processes and systems. VSM is a lean tool that helps in establishing the current state of a process and helps in revealing opportunities for improvements in the process. The aim of this paper is to represent the current state of a re-imbursement process and it’s lean afterwards. The Employee Reimbursement Process for a telephonic company as an enterprise has been selected as the case study. The objective is to identify and eliminate waste which can be any activity that is not adding value to the system. At the end, the improved model for the re-imbursement has also been addressed

    VALUE STREAM MAPPING FOR EMPLOYEE RE-IMBURSEMENT PROCESS OF AN ENTERPRISE

    Get PDF
    Every organization is striving hard on getting more work done in less time and with greater ease.  The organizations have been working continuously to improve their cycle time by minimizing the wastes within the system and maximizing their flow. It not only provides them with the improved quality at a reasonable price but also leads to the customer satisfaction by providing the right product/service at the right time. Value Stream Mapping (VSM) is a paper and pencil tool that helps one to see and understand the flow of material and information as a product or service makes its way through the value stream. The main objective of Value Stream Mapping is to understand the ways to lean the processes and systems. VSM is a lean tool that helps in establishing the current state of a process and helps in revealing opportunities for improvements in the process. The aim of this paper is to represent the current state of a re-imbursement process and it’s lean afterwards. The Employee Reimbursement Process for a telephonic company as an enterprise has been selected as the case study. The objective is to identify and eliminate waste which can be any activity that is not adding value to the system. At the end, the improved model for the re-imbursement has also been addressed

    Genetics of drought tolerance at seedling and maturity stages in Zea mays L.

    Get PDF
    Shortage of irrigation water at critical growth stages of maize is limiting its production worldwide. Breeding drought-tolerant cultivars is one possible solution while identification of potential genotypes is crucial for genetic improvement. To assess genetic variation for seedling-stage drought tolerance, we tested 40 inbred lines in a completely randomized design under glasshouse conditions. From these, two contrasting inbred lines were used to develop six basic generations (P1, P2, F1, F2, BC1F1, BC2F2). These populations were then evaluated in a triplicated factorial randomized complete block design under non-stressed and drought-stressed conditions. For statistical analyses, a nested block design was employed to ignore the replication effects. Significant differences (p≤0.01) were recorded among the genotypes for investigated seedling-traits. Absolute values of fresh root length, fresh root weight, and dry root weight lead to select two genotypes, one tolerant (WFTMS) and one susceptible (Q66). Estimates of heritability, genetic advance, and genotypic correlation coefficients were higher and significant for most of the seedling-traits. Generation variance analysis revealed additive gene action. Narrow-sense heritability [F2 ≥ 65; F∞ ≥ 79] revealed the same results. Generation mean analysis signified additive genetic effects in the inheritance of cob girth, non-additive for plant height, grains per ear row and grain yield per plant, and environmental for ear leaf area, cob length, grain rows per ear, biomass per plant, and 100-grain weight under drought-stressed conditions. For conferring drought-tolerance in maize, breeders can adopt the recombinant breeding strategy to pyramid the desirable genes

    Development and genetics of maize doubled haploid lines

    Get PDF
    The present study was carried out to develop doubled haploid lines using in-vivo maternal haploid induction technique.The study was aimed at the reliability of haploid seed identification through the R1-nj visual colored marker,identification of spontaneous doubling in tropical germplasm, optimization of colchicine percentage and seedlingcutting methods for artificial chromosome doubling and revealing the genetics of newly developed DH-lines. Twotropical haploid inducer lines with 4-6% HIR were used as male parents and crossed with a single hybrid FH-949as female donor parent. The R1-nj visual colored marker was used to sort haploid from diploid kernels. To checkthe spontaneous chromosome doubling rate these haploid kernels were grown in the field. In the laboratory, differentcolchicine percentages and seedling cutting treatments were used to double these maternal haploids. Thedata for seedling survival and DHo seed formation was collected and generalized linear model GLM was used tointerpret treatment results. SAS 9.2 was used to estimate confidence intervals for the binomial proportion havingzero frequencies. Out of twenty doubled haploid lines developed, five were crossed with three OPVs in line ×tester mating design. The data was collected and evaluated for combining ability and type of gene action for theyield and its related traits. The R1-nj dominant anthocyanin marker was found to be 91 percent effective in identifyingmaternal haploid seeds at the dormant stage. The spontaneous doubling percentage of maternal haploidswas recorded 0.8%. All the lines showed good general combining ability. The additive type of gene action wasprevailing in most of the traits studied

    RELATIONSHIP BETWEEN METROLOGICAL PARAMETERS AND VECTOR BORNE DENGUE DISEASE USING ONCOLOGICAL FRACTAL TREATMENT

    Get PDF
    Dengue is the most vital arboviral disease in humans, which is occurring in tropical and subtropical areas around the world. Dengue fever is itemized as an urban human disease as it spreads easily to urban environmental/ morphological contexts because of the uneven increase of urban population and infectious diseases as a result of climate change. Dengue epidemic cases related to climatic parameters are helpful to monitor and prevent the transmission of dengue fever. Many studies have focused on describing the clinical aspects of dengue outbreak. We bring out the epidemiological study to investigate the dengue fever development and prediction in the Karachi city. This study described the oncological treatment by statistical analysis and fractal rescaled range (R/S) method of the dengue epidemics from January 2001 to December 2020, based on the urban morphological patterns, and climatic variables including temperature and ENSO respectively. The R/S method in oncologists has been carried in two ways, basic oncological/statistical analysis and Fractal dimension adapt to the study the nature of the subtleties of dengue epidemic data, another showing the dynamics of oncological process. Climate parameters are shown that the fractal dimension value revealed a persistency behavior i.e. time series is an increasing, Fractal analysis also confirmed the anti-persistent behavior of dengue for months of September to November and the normality tests specified the robust indication of the intricacy of data. This study will be useful for future researchers working on epidemiology and urban environmental oncological fields to improve and rectify the urban infectious diseases

    Identity-based edge computing anonymous authentication protocol

    Get PDF
    With the development of sensor technology and wireless communication technology, edge computing has a wider range of applications. The privacy protection of edge computing is of great significance. In the edge computing system, in order to ensure the credibility of the source of terminal data, mobile edge computing (MEC) needs to verify the signature of the terminal node on the data. During the signature process, the computing power of edge devices such as wireless terminals can easily become the bottleneck of system performance. Therefore, it is very necessary to improve efficiency through computational offloading. Therefore, this paper proposes an identity-based edge computing anonymous authentication protocol. The protocol realizes mutual authentication and obtains a shared key by encrypting the mutual information. The encryption algorithm is implemented through a thresholded identity-based proxy ring signature. When a large number of terminals offload computing, MEC can set the priority of offloading tasks according to the user’s identity and permissions, thereby improving offloading efficiency. Security analysis shows that the scheme can guarantee the anonymity and unforgeability of signatures. The probability of a malicious node forging a signature is equivalent to cracking the discrete logarithm puzzle. According to the efficiency analysis, in the case of MEC offloading, the computational complexity is significantly reduced, the computing power of edge devices is liberated, and the signature efficiency is improved

    A cross-domain trust model of smart city IoT based on self-certification

    Get PDF
    Smart city refers to the information system with Internet of things and cloud computing as the core technology and government management and industrial development as the core content, forming a large-scale, heterogeneous and dynamic distributed Internet of things environment between different Internet of things. There is a wide demand for cooperation between equipment and management institutions in the smart city. Therefore, it is necessary to establish a trust mechanism to promote cooperation, and based on this, prevent data disorder caused by the interaction between honest terminals and malicious terminals. However, most of the existing research on trust mechanism is divorced from the Internet of things environment, and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of things devices, resulting in the fact that the research on abstract trust mechanism cannot be directly applied to the Internet of things; On the other hand, various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered. Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals, a cross domain trust model (CDTM) based on self-authentication is proposed. Unlike most trust models, this model uses self-certified trust. The cross-domain process of internet of things (IoT) terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction. At the same time, in order to alleviate the collision attack and improve the accuracy of trust evaluation, the overall trust value is calculated by comprehensively considering the quantity weight, time attenuation weight and similarity weight. Finally, the simulation results show that CDTM has good anti collusion attack ability. The success rate of malicious interaction will not increase significantly. Compared with other models, the resource consumption of our proposed model is significantly reduced
    • …
    corecore